CyberChef
Asymmetric & Symmetric
Encryption
Digital Signature
Page 1
Asymmetric Encryption (RSA)
Establish secure
communication by
exchanging the public
keys. Only the intended recipient
can decrypt the message.
Symmetric Encryption (AES)
Ensures a secure
communication tunnel by
using a shared session key
for encrypting and
decrypting between client
and server.
Page 2
CyberChef
1. Generate asymmetric keys:
RSA key pair
Page 3
2. Generate the Session Key for
Symmetric Encryption (AES):
a. Main AES key generation (32 bytes)
Session key
b. Initialization vector generation (IV) (16
bytes)
Page 4
3. The client initialize the connection and
specifies the encryption protocols: "Hello!"
4. Server replies with
the certificate and the public key: "Hello!"
Page 5
5. The client verifies certificate's authenticity
and replies with the
session key which is encrypted
with the server's public key:
Session key
Encrypted Session key
Page 6
6. Server decrypts the session key using its
private key:
Encrypted Session key
Session key
Page 7
7. The connection between server and client is
securely established and
encrypted / decrypted with the
symmetric key:
Message
Session key
Encrypted message
with session key
Encrypted message
with session key
Session key
Message decrypted
Page 8
Digital signature
ensures integrity, authentication, and
nonrepudiation
When it is used:
1. Message integrity
To ensure a message /
document is authentic
and hasn't been tampered
by a threat actor
2. Software authenticity
To confirm software is genuine and
unaltered
from the original sender
Page 9
1. The server sends:
the message: This is the message. If you can
decrypt it, you know it is from me.
the hash of the message
Message
Hash of the message
Page 10
(the hash of the message) which is
encrypted with the server's private key - Digital
Signature
Hash of the message
Digital Signature
Page 11
2. The Client:
receives the message and recreates the hash
verifies the digital signature using the server's
public key:
Hash of the message
Digital Signature
Page 12
The digital signature was
successfully verified:
Authentication: The public key matches
the private key
used to create the signature.
Integrity: The computed hash matches the
received hash,
confirming the message's integrity.
Nonrepudiation: The sender cannot deny
having created the signature.
Page 13
Thank you!
Curious to learn more?
Try it yourself with CyberChef!
Page 14